Sciweavers

83 search results - page 12 / 17
» Implementing Trustworthy Services Using Replicated State Mac...
Sort
View
DSN
2004
IEEE
15 years 3 months ago
Efficient Byzantine-Tolerant Erasure-Coded Storage
This paper describes a decentralized consistency protocol for survivable storage that exploits local data versioning within each storage-node. Such versioning enables the protocol...
Garth R. Goodson, Jay J. Wylie, Gregory R. Ganger,...
SEMWEB
2004
Springer
15 years 5 months ago
SWS for Financial Overdrawn Alerting
Abstract. In this paper, we present a Notification Agent designed and implemented using Semantic Web Services. The Notification Agent manages alerts when critical financial situati...
José Manuel López Cobo, Silvestre Lo...
BMCBI
2004
131views more  BMCBI 2004»
14 years 11 months ago
A web services choreography scenario for interoperating bioinformatics applications
Background: Very often genome-wide data analysis requires the interoperation of multiple databases and analytic tools. A large number of genome databases and bioinformatics applic...
Remko de Knikker, Youjun Guo, Jin-long Li, Albert ...
CAISE
2007
Springer
15 years 6 months ago
Conceptual Modeling of Privacy-Aware Web Service Protocols
Abstract. Internet users are becoming increasingly concerned about their personal information being collected and used by Web service providers. They want to ensure that it is stor...
Rachid Hamadi, Hye-Young Paik, Boualem Benatallah
DAGSTUHL
2006
15 years 1 months ago
Denial of Service Protection with Beaver
We present Beaver, a method and architecture to "build dams" to protect servers from Denial of Service (DoS) attacks. Beaver allows efficient filtering of DoS traffic us...
Gal Badishi, Idit Keidar, Amir Herzberg, Oleg Roma...